From the Fall 2013 Issue

Maryland The Epicenter for Cybersecurity

Author(s):

Andrew L. Bareham, CPA, MST, Principal, State and Local Tax (SALT) Chair, KatzAbosch

As a neighbor of Washington DC, the state of Maryland is the headquarters for many businesses that provide services to the federal government. In fact, many federal agencies are located in the Maryland suburbs around Interstate 495, commonly known as the Capital Beltway. The government contractors have located in Maryland, close to their government clients. … Read more

From the Fall 2013 Issue

NSA creates partnership with North Carolina State University

Author(s):

National Security Agency/Central Security Service, ,

New Laboratory Focuses on Big Data Analysis  The National Security Agency and North Carolina State University have partnered to establish the Laboratory for Analytic Sciences (LAS) on NC State’s Centennial Campus in Raleigh. Located near Research Triangle Park, the laboratory will be a cornerstone of the emerging advanced data innovation hub at NC State, bringing … Read more

From the Fall 2013 Issue

Biography: General Keith B. Alexander, United States Army

Author(s):

National Security Agency/Central Security Service, ,

General Keith B. Alexander, USA, is the Commander, U.S. Cyber Command (USCYBERCOM) and Director, National Security Agency/Chief, Central Security Service (NSA/CSS), Fort George G. Meade, MD. As Commander, USCYBERCOM, he is responsible for planning, coordinating and conducting operations and defense of DoD computer networks as directed by USSTRATCOM. As the Director of NSA and Chief … Read more

From the Fall 2013 Issue

NSA Announces Four New Schools for Cyber Initiative

Author(s):

National Security Agency/Central Security Service, ,

NSA Announces Four New Schools for Cyber Initiative  Four new schools have been selected for the National Security Agency’s National Centers of Academic Excellence in Cyber Operations Program, which was designed to cultivate more U.S. cyber professionals in an ever-changing global environment. After a rigorous application and screening process, NSA selected the following schools to … Read more

From the Fall 2013 Issue

10th Anniversary National Cyber Security Awareness Month

Author(s):

StaySafeOnline.org, , National Cyber Security Alliance

National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industryto ensure every American has the resources they need to stay safer and more secure online. Since its inception a decade ago under leadership from the U.S. Department of Homeland Security and the National Cyber … Read more

From the Fall 2013 Issue

Look Out Palo Alto – Here Comes Howard County! The New Epicenter within a Federal Contracting Valley…

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, Maryland) Howard County-based businesses are providing the newest form of triage for security hungry customers who just can’t get enough – Cybersecurity. Customers include health-care providers, major mainframe computer manufacturers, mobile device makers, telecommunication businesses and oil companies. With predictions of a major cyber-attack ever looming, and daily press reports of attacks on both … Read more

From the Fall 2013 Issue

Operating with Privacy in the Wild, Wild West of Wireless Technologies

Author(s):

Ronald J. Waranowski, ,

Look at the current state of the mobile wireless landscape. iPads used both at home and the office, smartphones with GPS tracking on in the background, business laptops automatically connecting to the local coffee shop’s wi-fi network, and personal and business applications running on the same smart devices, all connected and transmitting private information via … Read more

From the Fall 2013 Issue

Location, A Must for Mobile Security

Author(s):

Sage Osterfeld, , AirPatrol Corp.

The smartphone isn’t much of a phone anymore. According to a recent study from O2 research, the smartphone, which is 80% of all the phones sold over the past couple of years, is used for phone calls a paltry 9% of the time. Email, games, music and social media are all more popular uses. More … Read more

From the Fall 2013 Issue

Protecting Critical Data and Infrastructure: Testing and Certifying Technology

Author(s):

Tim Boyd, , The MIL Corporation

Today’s headlines are filled with worry and concern over the need to protect the nation’s critical infrastructure. Presidential Policy Directive 21 calls for a “national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure.” In governmental terms, “critical infrastructure” often refers to computer controlled power grids, highly automated nuclear power plants, … Read more

From the Fall 2013 Issue

Diffusing cyber threats starts with intelligence and people

Author(s):

Lockheed Martin, ,

Cyber security is at the core of all we do at Lockheed Martin. From the sophisticated aircraft we develop, to the data analytics solutions we provide, we ensure our customers’ platforms and systems are protected from cyber attacks. Today, Lockheed Martin is the foremost expert in delivering the intelligence driven defense approach necessary to thwart … Read more